When you hear the phrase "Information Security," the first thing that comes to mind to most people are topics like access control, application hardening and policy enforcement. While these are all valid areas that need consideration, there's one element that remains that is not necessarily captured by those areas - the human element. Maintaining a [...]... Read MoreThe post Looking at Configuration Management in a Different Light appeared first on The State of Security.